Results 1 to 10 of about 2,910 (182)
A novel dataset for encrypted virtual private network traffic analysis [PDF]
Encryption of network traffic should guarantee anonymity and prevent potential interception of information. Encrypted virtual private networks (VPNs) are designed to create special data tunnels that allow reliable transmission between networks and/or end
Mohamed Naas, Jan Fesl
doaj +2 more sources
Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik ...
Taufik Rahman +3 more
doaj +2 more sources
Security vs Bandwidth: Performance Analysis Between IPsec and OpenVPN in Smart Grid [PDF]
Secure wireless communication is an essential element of smart grid systems. This enables distributed industrial Internet of Things (IoT) assets to be remotely controlled and monitored from the control centre. In this piece of work, we evaluate the impact of employing OpenVPN and IPsec on the bandwidth required for the operation of distribution assets ...
Ghanem, Kinan +5 more
exaly +3 more sources
Analisa Konektivitas Jaringan IPSEC Dan OpenVPN Pada Jaringan Berbasis IP Dinamis
Saat ini jaringan merupakan kebutuhan vital bagi setiap perusahaan. Dengan internet maka jaringan dapat terbentuk dan menghubungkan antar sektor atau divisi dalam perusahaan.
As' Ari Setya, Aris Sudaryanto
doaj +3 more sources
Inferring OpenVPN State Machines Using Protocol State Fuzzing [PDF]
The reliability of a security protocol is of the utmost importance but can easily be compromised by a vulnerability in the implementation. A crucial aspect of an implementation is the protocol's state machine. The state machine of an implementation can be inferred by black box testing using regular inference.
Lesly-Ann Daniel, Joeri de Ruiter
exaly +3 more sources
OpenVPN is Open to VPN Fingerprinting
VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using “dual use” DPI technology.
Xue, Diwen +6 more
exaly +3 more sources
With the rise in cloud computing and virtualisation, secure and efficient VPN solutions are essential for network connectivity. We present a systematic performance comparison of OpenVPN (v2.6.12) and WireGuard (v1.0.20210914) across Azure and VMware ...
Joel Anyam +3 more
doaj +3 more sources
The article analyzes the problem of secure connection of a remote client to the internal computer network of the higher education institution. The most commonly used OpenVPN, Libreswan and WireGuard solutions were evaluated.
Liudvikas Kaklauskas +1 more
doaj +1 more source
SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін +3 more
doaj +1 more source

